Classifications of user-authentication methodsbased on five different taxonomies.

–User identification-based taxonomy.

–Authentication methodology-based taxonomy.

–Authentication quality-based taxonomy.

–Authentication complexity-based taxonomy.

–Authentication scope-based taxonomy.

Elements of User Authentication Methods.

–User identification.

–Authentication protocol.

–Registration of legitimate users.

4/28/2008

3

Definitions

Authentication:

–User authentication is a process where a computer, computerprogram, or another user attempts to confirm that a user trying toset up a communication, is the person he or she claims to be.

Identification:

–Identification is a way of providing a user with a unique identifierfor an automated system. During the authentication process, thesystem validates the authenticity of the claimed user identity bycomparing identification data with data stored in a user registry.

Authorization:

–Authorization is a process of assigning rights to an authenticateduser to perform certain actions in the system.

4/28/2008

4

User Identification-BasedTaxonomy

This

taxonomy of user authentication is based on how a useridentifies himself or herself.